US7356474B2 - System and method for remotely enforcing operational protocols - Google Patents
System and method for remotely enforcing operational protocols Download PDFInfo
- Publication number
- US7356474B2 US7356474B2 US10/246,855 US24685502A US7356474B2 US 7356474 B2 US7356474 B2 US 7356474B2 US 24685502 A US24685502 A US 24685502A US 7356474 B2 US7356474 B2 US 7356474B2
- Authority
- US
- United States
- Prior art keywords
- actions
- protocol
- action
- user
- officer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000009471 action Effects 0.000 claims abstract description 131
- 238000004891 communication Methods 0.000 claims description 14
- 230000004044 response Effects 0.000 claims description 13
- 230000001755 vocal effect Effects 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 13
- 239000000284 extract Substances 0.000 abstract 1
- 238000012545 processing Methods 0.000 description 24
- 230000008569 process Effects 0.000 description 15
- 238000010586 diagram Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 235000015041 whisky Nutrition 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 230000000875 corresponding effect Effects 0.000 description 2
- 239000003814 drug Substances 0.000 description 2
- 229940079593 drug Drugs 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000009172 bursting Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/22—Procedures used during a speech recognition process, e.g. man-machine dialogue
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/28—Constructional details of speech recognition systems
- G10L15/30—Distributed recognition, e.g. in client-server systems, for mobile phones or network applications
Definitions
- the present invention relates in general to a system and method for remotely enforcing operational protocols, such as those found in law enforcement environments. More particularly, the present invention relates to a system and method for forcing particular actions to be performed in light of a given operational situation being encountered by a user of the system.
- Some operational environments such as those encountered by law enforcement personnel, are high workload environments. These types of environments often allow the worker, such as a police officer, to have a certain amount of discretion when faced with a given operational situation.
- certain actions are deemed mandatory because of the situation. These mandatory actions may be a result of organizational policy, such as that set forth a police department, and may also be statutorily required, such as steps that legally must be taken to place a person in custody.
- Modern operational environments such as that of modern day law enforcement officials, includes a myriad of actions that should be taken or must be taken given an operational situation. Failure to abide by these actions in a law enforcement setting can result in difficulty convicting a potential wrongdoer because of an improper arrest as well as potential danger to the officer or the public.
- the number of actions that should, or must, be taken, coupled with the dynamic, fast paced environment causes difficulty in personnel remembering and carrying out the appropriate actions.
- Voice recognition technology is used in remote environments, such as a law enforcement environment, to identify a particular protocol and the actions appropriate for the identified protocol. While some actions may be optional, other actions are mandatory. Many mandatory actions are performed automatically—such as calling for backup and operating various devices in the remote environment. Other mandatory actions that must be performed by the user of the system are communicated to the user so that the user is less likely to fail to proper protocol.
- Voice recognition technology receives voice input from the user that is operating in the remote environment.
- a command processor analyzes the received vocal inputs and determines the applicable protocol as well as the parameters, if any, that apply to the protocol.
- An example of one parameter that may be used in a law enforcement setting is a suspect's vehicle license plate number.
- Actions associated with the identified protocol are performed. Again, in a law enforcement setting, such actions may include device automation actions, automated communications actions, and automated data retrieval actions. If the police officer has encountered a probable stolen vehicle, some of the device actions may be to automatically engage the emergency lights and siren, communication actions may be to automatically call for backup, and data retrieval actions may be to request a search of the Department of Motor Vehicle (DMV) records to determine the rightful owner of an automobile.
- DMV Department of Motor Vehicle
- Some actions may be discretionary in one protocol while mandatory in another.
- a protocol for stopping a motorist that has sped through a red stop light may allow the officer discretion as to whether to issue a citation. This allows the human element of the police officer's duties to determine whether there is a good excuse, such as rushing to the hospital in an emergency, that weighs against the issuing of a citation.
- the protocol may require an arrest or citation to ensure that the officer is not providing any favoritism to drug offenders and to address the more serious nature of the offense.
- Location data such as the officer's position
- the location data allows centralized operations, such as a dispatcher, to automatically send backup to the officer's location without having to rely on landmarks and the like. This allows the officer to pay closer attention to what could be a dangerous situation, rather than looking around for available landmarks.
- An activity log is automatically maintained that details the protocols entered by the remote user as well as the actions taken.
- Technology such as video and audio recording technology, is employed to both verify the officer's adherence to departmental policy and protocol as well as to gather crucial evidence against a suspect that was identified or apprehended by the officer.
- FIG. 1 is a diagram showing a police car acting as a remote center for carrying out actions according to prescribed protocols
- FIG. 2 is a block diagram of components used in remotely enforcing operational protocols
- FIG. 3 is an example of two protocols that might be used in a law enforcement environment
- FIG. 4 is a flowchart showing the remote location identifying a situation and using the appropriate protocol
- FIG. 5 is a flowchart showing the steps taken to parse parameters from user input and store them for use with protocol actions
- FIG. 6 is a flowchart showing steps taken in performing actions specified by a particular protocol.
- FIG. 7 is a block diagram of an information handling system capable of implementing the present invention.
- FIG. 1 is a diagram showing a police car acting as a remote center for carrying out actions according to prescribed protocols.
- Emergency vehicle 100 is shown with an assortment of components used in assisting the police officer in performing law enforcement activities.
- Task handler 140 is a computer program operating in a computer system within emergency vehicle 100 .
- the task handler is shown operating in the officer's mobile data terminal, or MDT ( 135 ).
- MDT mobile data terminal
- the task handler can be executed from any mobile computer system operating within the emergency vehicle.
- Emergency vehicle 100 also includes emergency lights 105 for visually alerting other motorists and pedestrians that the officer is responding to an emergency.
- siren 100 is used to alert others with a loud audible sound that the officer is responding to an emergency. Both the emergency lights and siren can be automatically engaged by task handler 140 , depending upon the type of protocol that has been identified.
- Camera 130 includes a video camera and a microphone for recording sound.
- the microphone may be integrated with the camera or may be remote, such as clipped onto the officer's uniform for recording statements and comments made by a stopped motorist or suspect.
- the camera is also able to be turned on and off by the task handler depending upon the identified protocol.
- GPS receiver 120 receives global positioning data from global positioning satellites 125 .
- GPS data collected by the GPS receiver is used in communications with other officers and a centralized office to inform others of the officer's location.
- the officer may be unable to determine an exact location when in locations such as a rural or wilderness area. In other instances, the officer may be too busy pursuing a suspect or may be injured and incapacitated.
- the GPS data is also usable by task handler 140 as a parameter in various communication actions that may be taken to assist the officer.
- Radio antenna 115 is used to communicate with other officers and headquarters 160 through communications network 150 .
- Communications network 150 is typically a wireless network that is capable of transmitting both voice and data.
- Request 155 is sent from the officer's vehicle to headquarters.
- the request may be a voice request, or may be a digital request.
- Each of these types of requests can include information, such as the officer's identifier, the GPS location of the officer, an identifier of a suspect or suspect vehicle, and a particular request.
- the request may be for a backup unit to be sent to the officer's location to provide assistance, to retrieve information regarding a suspect or a suspect's vehicle, or the like.
- Automated data response 170 is used to retrieve information, such as regarding a suspect vehicle, and return the retrieved information in response 195 .
- the retrieved response can be an auditory signal playable on the radio within the emergency vehicle or may be a textual response that is displayed on MDT 135 located within the emergency vehicle.
- Automated assistance response 180 includes automatically dispatching a nearby officer to a scene to provide backup as well as dispatching an ambulance to a scene to provide emergency medical assistance.
- Non-automated response 190 is a response made by a human supervisor or dispatcher to assist the officer. The non-automated response may be whether permission is given to the officer to engage in a high speed pursuit of a suspect, or other types of responses where human decision making is helpful or necessary.
- FIG. 2 is a block diagram of components used in remotely enforcing operational protocols.
- Microphone 200 is used to receive vocal inputs from the officer.
- the microphone is a wireless microphone that is able to be used by the officer when away from the emergency vehicle. For example, if the officer has walked away from the vehicle towards a suspect, he can still issue commands that are performed by the task handler operating within the vehicle. In addition, a command can be issued to disable the vehicle and/or lock the vehicle so that someone cannot enter the officer's vehicle and drive away. Likewise, the officer can also remotely “unlock” the vehicle and start the engine remotely in order to gain valuable time if a critical emergency has been reported.
- Audible speech 202 is received by the microphone and processed by voice recognition technology 205 .
- Voice recognition technology converts the audible speech into a textual form that can be processed by command processor 210 .
- Command processor 210 determines whether the officer has made a protocol statement or is simply talking to another person, either in person or on the phone. When the officer makes a protocol statement, the command processor invokes protocol lookup 215 .
- Protocol lookup 215 searches a data store for protocol actions 220 . These actions may be stored on a nonvolatile storage device, such as a disk drive, or stored in a volatile memory area, such as a memory buffer. Protocol lookup 215 retrieves the actions that apply the to identified protocol. Actions that are performed automatically are processed by automated protocol processor 225 .
- Automated protocol processor 225 receives information received from the officer that were included with the protocol statement as well as gathering other information, such as current location data 228 which is received from global positioning satellites 230 . Automated protocol processor 225 performs the various automated steps that are included for the identified protocol.
- Device automation 235 includes automation of the audio recorder 238 , video recorder 240 , emergency lights 242 , siren 245 , and other devices 248 . Other devices may also include the vehicle's ignition system to remotely start or stop the vehicle's engine remotely or to prevent someone from starting the vehicle's ignition using a key.
- Automated protocol processor 225 also performs automated communications 250 by transmitting and receiving information from sources 255 such as a central dispatcher, other officers, or the officer's supervisor. Automated protocol processor 225 also performs automated data retrieval operations 260 by communicating with computer systems 265 that include database management systems from which data can be retrieved and delivered to the officer.
- Automated communications also includes providing the officer with additional instructions 270 that the officer is expected to follow. For example, if pursuit of a suspect is not permitted or authorized, a message can be played over speaker 280 in the vehicle as well as displayed on MDT 295 instructing the officer to not engage in a high speed pursuit.
- Situational data 275 is returned from the automated data retrieval process providing the officer with information regarding the current situation, such as whether a vehicle has been reported as stolen and whether a motorist that has been stopped has any outstanding warrants. Similar to the officer instructions, situational data 275 is also playable on radio speaker 280 as well as displayable on MDT 295 .
- Officer activity logger 290 is used to log the protocols that have been encountered by the officer as well as the actions, both mandatory and discretionary, that were taken by the officer in responding to the situation. This logged data is stored in nonvolatile storage area 295 in a manner making modification of the logged data exceedingly difficult or impossible, such as encrypting the data with a password unknown to the officer. In this manner, data stored in officer's activity log 295 is helpful in ascertaining whether police department policy was followed by the officer as well as in investigating complaints of officer misconduct.
- FIG. 3 is an example of two protocols that might be used in a law enforcement environment.
- Protocol table 300 includes protocol identifier 310 , a flag indicating whether an action is mandatory 320 , a type of action 330 , and an action to be performed 340 .
- the protocol uniquely identifies a set of actions that are performed when a particular situation is encountered. For example, a “10-38” is an example of actions that might be taken for stopping a vehicle for any number of reasons, while a “10-99” protocol is an example of actions that might be taken for a stolen vehicle.
- Mandatory flag 320 indicates whether the corresponding action must be taken by the officer (or on behalf of the officer, in the case of an automated action), or whether the action is discretionary.
- the officer has discretion as to whether to issue a citation, arrest the individual for if a more serious infraction is discovered, issue a warning, or allow the motorist to go without a citation or warning.
- Other actions are mandatory, with many of such actions performed automatically by the task handler.
- One protocol such as a 10-38 traffic stop, can be combined with other protocol(s) depending upon the situation encountered. For example, if the data returned to the officer reveals that the automobile is stolen, then the officer initiates the “10-99” protocol for actions taken with a stolen car. For the stolen vehicle, note that high speed pursuit of the suspect is authorized, but not mandatory. In addition, unlike the standard traffic stop, the officer must now arrest the individual driving the stolen vehicle.
- Type of action 330 indicates whether the action is to log information, control or automate a device, communicate with headquarters, retrieve data, or provide a message to the officer.
- Action 340 is a program script instructing the task handler to perform certain actions.
- the actions within a protocol are listed in the sequence in which the actions are to be performed.
- Embedded in the action's program script are variable tags 350 indicated with a particular delimiter, such as the “%” delimiter shown.
- the protocol identifier, the timestamp, and the officer's GPS coordinates are logged.
- the officer's identification number, the protocol, and the officer's GPS location are communicated to dispatch. Data retrieval steps, such as checking to see whether the car is stolen, retrieving the DMV records, and checking outstanding warrants are performed against the license plate number of the suspect's vehicle.
- a single device may be controlled differently depending on the protocol. For example, during the vehicle stop the protocol simply “bursts” the siren to notify the motorist to stop, while during the stolen car protocol, the siren would simply be turned “on” rather than bursting.
- the protocol simply “bursts” the siren to notify the motorist to stop, while during the stolen car protocol, the siren would simply be turned “on” rather than bursting.
- an officer would initiate pursuit using the 10-38 protocol (i.e. burst the siren), but upon receiving information from headquarters that the automobile was reported stolen the siren would be turned on.
- the protocol table describing the actions performed for various protocols can be extensive as well as flexible. Actions for some officers, such as junior officers, may be set as “mandatory,” while more experienced officers can be given discretion for the same action.
- the protocol table can also be modified in light of changes to department policies or changes to applicable law.
- FIG. 4 is a flowchart showing the remote location identifying a situation and using the appropriate protocol.
- Processing commences at 400 whereupon voice recognition technology is used to listen (step 405 ) for one or more protocol keywords (e.g., “10-55,” “10-99,” etc.).
- the voice recognition technology receives the voice from the officer that is speaking into microphone 410 .
- the microphone can be fixed to the officer's vehicle or, preferably, wirelessly worn on the officer's uniform so that protocol actions can be initiated regardless of the officer's location.
- the converted words spoken by the officer are stored in buffer 415 in a text form so that the words before and after the protocol keyword can be analyzed and acted upon when a protocol keyword is detected.
- decision 440 branches to “no” branch 450 whereupon a determination is made as to whether the protocol requested was to shutdown the system (decision 455 ). If a shutdown request was received, decision 455 branches to “yes” branch 492 whereupon processing ends at 495 .
- decision 455 branches to “no” branch 460 whereupon the command parameters are parsed (predefined process 465 , see FIG. 5 for processing details).
- the actions for the identified protocol are retrieved (step 470 ) from protocol table 475 .
- a determination is made as to whether protocol actions were found for the identified protocol (decision 480 ). If protocol actions were not found, decision 480 branches to “no” branch 482 whereupon the officer is notified that automated assistance is not available and the officer should manually perform the steps required by the protocol and processing loops back to continue listening for further protocol keywords.
- decision 480 branches to “yes” branch 488 whereupon the located protocol actions are performed (predefined process 490 , see FIG. 6 for processing details). Processing thereafter loops back to continue listening for further protocol keywords.
- FIG. 5 is a flowchart showing the steps taken to parse parameters from user input and store them for use with protocol actions.
- a police officer might issue a vocal call such as “720, 10-38 with NC registration Hotel Whiskey Kilo 345 on highway 55 near Cooper's store. Possible 10-55.”
- the “720” is the officer's (or vehicle's) identification number
- the “10-38” indicates that the officer is stopping a motor vehicle
- the words “NC registration Hotel Whiskey Kilo 345” indicates that the vehicle's license number is HWK 345
- the “Hotel Whiskey Kilo” are used to phonetically indicate an H, W, and K, respectively.
- the processing shown in FIG. 5 parses this information into the appropriate variables.
- Processing commences at 500 whereupon the first word is selected (step 504 ) from the phrase surrounding the protocol stored in buffer 508 .
- the retrieved word is compared with parameter cues 516 to identify the input of a particular parameter (step 512 ).
- a determination is made as to whether the selected word matches one of the parameter cues (decision 520 ). If the selected word does not match a parameter cue, decision 520 branches to “no” branch 523 whereupon the next word is selected (step 505 ) and processing loops back to process the selected word.
- decision 520 branches to “yes” branch 522 to gather data about the particular parameter.
- a determination is made as to whether the cue is “registration” of a vehicle (decision 524 ). If the cue is “registration,” then decision 524 branches to “yes” branch 526 whereupon a vehicle tag variable is initialized (step 528 ).
- the state identifier is retrieved (step 532 ). In the example above, the “NC” state identifier for NC was provided just before the keyword “registration” was spoken. The state identifier is added to the vehicle tag variable. In the example above, the vehicle tag would now be set to “NC”.
- the first word of the registration is selected (step 536 ).
- decision 548 branches to “yes” branch 550 whereupon the corresponding letter is looked up in the phonetic alphabet (step 552 ) and the letter is appended to the vehicle tag variable (step 560 ).
- decision 548 branches to “no” branch 554 whereupon a determination is made as to whether the word spoken is a letter such as “H,” “W, ” or “K” (decision 556 ). If the word spoken is a letter, decision 556 branches to “yes” branch 558 whereupon the letter spoken is appended to the vehicle tag variable (step 560 ). On the other hand, if the word spoken is not a number, a word used to phonetically identify a letter, or a letter, then the vehicle tag information is complete and the word falls outside the registration information. In this case, decision 556 branches to “no” branch 562 which loops back to process the selected word.
- decision 564 After a number or letter has been appended to the vehicle tag variable, a determination is made as to whether there are more words to process (decision 564 ). If there are no more words to process, decision 564 branches to “no” branch 566 whereupon processing ends at 568 . On the other hand, if there are more words, decision 564 branches to “yes” branch 570 whereupon the next word is selected from the protocol phrase (step 572 ) and processing loops back to determine whether the selected word is part of the vehicle license plate identifier.
- decision 524 if the matched parameter cue is not “registration,” decision 524 branches to “no” branch 574 .
- decision 588 A determination is made as to whether there are more words in the protocol phrase to process (decision 588 ). If there are more words, decision 588 branches to “yes” branch 590 whereupon the next word from the protocol phrase is selected (step 505 ) and processing loops back to process the selected word. This looping continues until there are no more words in the protocol phrase to process, at which time decision 588 branches to “no” branch 592 and processing ends at 595 .
- FIG. 6 is a flowchart showing steps taken in performing actions specified by a particular protocol. Processing commences at 600 whereupon the first action for the protocol is retrieved (step 604 ) from protocol actions data store 608 .
- variable data is needed to perform the action (e.g., the actions shown in FIG. 3 with variable delimiters) then decision 632 branches to “yes” branch 634 whereupon a determination is made as to whether the needed variables have been set or initialized (decision 636 ). If the variables have not been set or initialized, decision 636 branches to “no” branch whereupon the officer is prompted to provide the needed variable data (step 640 ). On the other hand, if the variable data has been set or initialized (using the steps shown in FIG. 5 ), then decision 636 branches to “yes” branch 642 . The variable data is inserted into the action script parameters (step 644 ).
- variable data After either the variable data has been inserted into the action parameters, or if variable data is not needed to perform the action (decision 632 branching to “no” branch 646 ), then a determination is made as to whether the action is to retrieve data (decision 648 ). If the action is to retrieve data, decision 648 branches to “yes” branch 650 whereupon a wireless data request is sent to a data provider (step 652 ), a wireless response is received that includes the requested data (step 656 ), and the requested data is provided to the user by displaying the data or audibly playing the data to the user on a speaker (step 660 ). Processing then loops back to process the next action.
- decision 648 branches to “no” branch 662 whereupon a determination is made as to whether the action is to communicate with headquarters (decision 664 ). If the action is a communications action, decision 664 branches to “yes” branch 668 whereupon a wireless communication is sent to headquarters or the dispatcher (step 670 ). Processing then loops back to process the next action.
- decision 664 branches to “no” branch 672 whereupon a determination is made as to whether the action is a device automation action (decision 676 ). If the action is a device automation action, decision 676 branches to “yes” branch 678 whereupon the device, such as a microphone, video camera, emergency lights, siren, etc., identified in the action is turned on/off or otherwise controlled as specified in the action (step 680 ). Processing then loops back to process the next action. If the request is not a device automation action, decision 676 branches to “no” branch 682 whereupon another type of action is performed, such as displaying a message to the user or logging information in a data store (step 684 ). Processing then loops back to process the next action.
- decision 676 branches to “no” branch 682 whereupon another type of action is performed, such as displaying a message to the user or logging information in a data store (step 684 ). Processing then loops back to process the next action.
- decision 688 determines whether there are more actions to execute for the protocol. If there are more actions, decision 688 branches to “yes” branch 690 whereupon the next action is retrieved (step 692 ) from protocol actions data store 608 and the selected action is processed. This looping continues until there are no more actions to execute for the protocol, at which time decision 688 branches to “no” 694 whereupon processing returns at 695 .
- FIG. 7 illustrates information handling system 701 which is a simplified example of a computer system capable of performing the operations described herein.
- Computer system 701 includes processor 700 which is coupled to host bus 705 .
- a level two (L2) cache memory 710 is also coupled to the host bus 705 .
- Host-to-PCI bridge 715 is coupled to main memory 720 , includes cache memory and main memory control functions, and provides bus control to handle transfers among PCI bus 725 , processor 700 , L2 cache 710 , main memory 720 , and host bus 705 .
- PCI bus 725 provides an interface for a variety of devices including, for example, LAN card 730 .
- PCI-to-ISA bridge 735 provides bus control to handle transfers between PCI bus 725 and ISA bus 740 , universal serial bus (USB) functionality 745 , IDE device functionality 750 , power management functionality 755 , and can include other functional elements not shown, such as a real-time clock (RTC), DMA control, interrupt support, and system management bus support.
- Peripheral devices and input/output (I/O) devices can be attached to various interfaces 760 (e.g., parallel interface 762 , serial interface 764 , infrared (IR) interface 766 , keyboard interface 768 , mouse interface 770 , fixed disk (HDD) 772 coupled to ISA bus 740 .
- interfaces 760 e.g., parallel interface 762 , serial interface 764 , infrared (IR) interface 766 , keyboard interface 768 , mouse interface 770 , fixed disk (HDD) 772 coupled to ISA bus 740 .
- IR infrared
- HDD fixed
- BIOS 780 is coupled to ISA bus 740 , and incorporates the necessary processor executable code for a variety of low-level system functions and system boot functions. BIOS 780 can be stored in any computer readable medium, including magnetic storage media, optical storage media, flash memory, random access memory, read only memory, and communications media conveying signals encoding the instructions (e.g., signals from a network).
- LAN card 730 is coupled to PCI bus 725 and to PCI-to-ISA bridge 735 .
- modem 775 is connected to serial port 764 and PCI-to-ISA Bridge 735 .
- FIG. 7 While the computer system described in FIG. 7 is capable of executing the invention described herein, this computer system is simply one example of a computer system. Those skilled in the art will appreciate that many other computer system designs are capable of performing the invention described herein.
- One of the preferred implementations of the invention is an application, namely, a set of instructions (program code) in a code module which may, for example, be resident in the random access memory of the computer.
- the set of instructions may be stored in another computer memory, for example, on a hard disk drive, or in removable storage such as an optical disk (for eventual use in a CD ROM) or floppy disk (for eventual use in a floppy disk drive), or downloaded via the Internet or other computer network.
- the present invention may be implemented as a computer program product for use in a computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
- Traffic Control Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (5)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/246,855 US7356474B2 (en) | 2002-09-19 | 2002-09-19 | System and method for remotely enforcing operational protocols |
US11/939,912 US7406423B2 (en) | 2002-09-19 | 2007-11-14 | Remotely enforcing operational protocols |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/246,855 US7356474B2 (en) | 2002-09-19 | 2002-09-19 | System and method for remotely enforcing operational protocols |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/939,912 Continuation US7406423B2 (en) | 2002-09-19 | 2007-11-14 | Remotely enforcing operational protocols |
Publications (2)
Publication Number | Publication Date |
---|---|
US20040059582A1 US20040059582A1 (en) | 2004-03-25 |
US7356474B2 true US7356474B2 (en) | 2008-04-08 |
Family
ID=31992372
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/246,855 Active 2025-01-04 US7356474B2 (en) | 2002-09-19 | 2002-09-19 | System and method for remotely enforcing operational protocols |
US11/939,912 Expired - Lifetime US7406423B2 (en) | 2002-09-19 | 2007-11-14 | Remotely enforcing operational protocols |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/939,912 Expired - Lifetime US7406423B2 (en) | 2002-09-19 | 2007-11-14 | Remotely enforcing operational protocols |
Country Status (1)
Country | Link |
---|---|
US (2) | US7356474B2 (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050055213A1 (en) * | 2003-09-05 | 2005-03-10 | Claudatos Christopher Hercules | Interface for management of auditory communications |
US20060004819A1 (en) * | 2004-07-01 | 2006-01-05 | Claudatos Christopher H | Information management |
US20060004818A1 (en) * | 2004-07-01 | 2006-01-05 | Claudatos Christopher H | Efficient information management |
US20060047518A1 (en) * | 2004-08-31 | 2006-03-02 | Claudatos Christopher H | Interface for management of multiple auditory communications |
US20100305807A1 (en) * | 2009-05-28 | 2010-12-02 | Basir Otman A | Communication system with personal information management and remote vehicle monitoring and control features |
US20110121991A1 (en) * | 2009-11-25 | 2011-05-26 | Basir Otman A | Vehicle to vehicle chatting and communication system |
US8103873B2 (en) | 2003-09-05 | 2012-01-24 | Emc Corporation | Method and system for processing auditory communications |
US8180742B2 (en) | 2004-07-01 | 2012-05-15 | Emc Corporation | Policy-based information management |
US8229904B2 (en) | 2004-07-01 | 2012-07-24 | Emc Corporation | Storage pools for information management |
US8244542B2 (en) | 2004-07-01 | 2012-08-14 | Emc Corporation | Video surveillance |
US8838075B2 (en) | 2008-06-19 | 2014-09-16 | Intelligent Mechatronic Systems Inc. | Communication system with voice mail access and call by spelling functionality |
US8856009B2 (en) | 2008-03-25 | 2014-10-07 | Intelligent Mechatronic Systems Inc. | Multi-participant, mixed-initiative voice interaction system |
US20150088339A1 (en) * | 2013-09-23 | 2015-03-26 | Horton Emergency Vehicles | Emergency vehicle control application |
US9042873B2 (en) | 2010-06-07 | 2015-05-26 | Intelligent Mechatronic Systems Inc. | On the road groups |
US9268780B2 (en) | 2004-07-01 | 2016-02-23 | Emc Corporation | Content-driven information lifecycle management |
US9652023B2 (en) | 2008-07-24 | 2017-05-16 | Intelligent Mechatronic Systems Inc. | Power management system |
US9667726B2 (en) | 2009-06-27 | 2017-05-30 | Ridetones, Inc. | Vehicle internet radio interface |
US9930158B2 (en) | 2005-06-13 | 2018-03-27 | Ridetones, Inc. | Vehicle immersive communication system |
WO2018075443A1 (en) * | 2016-10-17 | 2018-04-26 | Muppirala Ravikumar | Remote identification of person using combined voice print and facial image recognition |
US9976865B2 (en) | 2006-07-28 | 2018-05-22 | Ridetones, Inc. | Vehicle communication system with navigation |
US11208125B2 (en) * | 2016-08-08 | 2021-12-28 | Transportation Ip Holdings, Llc | Vehicle control system |
US12112613B2 (en) | 2016-10-17 | 2024-10-08 | Md Enterprises Global Llc | Systems and methods for identification of a person using live audio and/or video interactions including local identification and remote identification of the person |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7119832B2 (en) * | 2001-07-23 | 2006-10-10 | L-3 Communications Mobile-Vision, Inc. | Wireless microphone for use with an in-car video system |
US7026957B2 (en) * | 2001-10-01 | 2006-04-11 | Advanced Public Safety, Inc. | Apparatus for communicating with a vehicle during remote vehicle operations, program product, and associated methods |
US10110795B2 (en) * | 2002-06-04 | 2018-10-23 | General Electric Company | Video system and method for data communication |
US8738383B2 (en) * | 2007-06-07 | 2014-05-27 | Aesynt Incorporated | Remotely and interactively controlling semi-automatic devices |
JP5270955B2 (en) * | 2008-04-23 | 2013-08-21 | パナソニック株式会社 | In-vehicle device, server device, and communication system |
ES1076337Y (en) * | 2011-09-01 | 2012-09-07 | Luxae S L U | SIGNALING EQUIPMENT AND ACCESSORIES FOR PRIORITY VEHICLES WITH INTELLIGENT CONTROL |
US20170286427A1 (en) * | 2016-03-31 | 2017-10-05 | Cae Inc. | Method, device and system for calculating a list of priority indicators, in an emergency-vehicle-units deployment system, for each of a plurality of posts |
AU2017285025A1 (en) * | 2016-06-13 | 2018-12-13 | Intergraph Corporation | Systems and methods for expediting repairs of utility equipment using electronic dialogs with people |
WO2019177470A1 (en) | 2018-03-16 | 2019-09-19 | Motorola Solutions, Inc | Device, system and method for controlling a communication device to provide notifications of successful documentation of events |
US10867219B2 (en) * | 2018-08-30 | 2020-12-15 | Motorola Solutions, Inc. | System and method for intelligent traffic stop classifier loading |
Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3678391A (en) | 1970-04-06 | 1972-07-18 | Sylvania Electric Prod | Digital communication system |
US5027383A (en) | 1987-06-12 | 1991-06-25 | Versus Technology, Inc. | Supervised, interactive alarm reporting system |
US5451892A (en) | 1994-10-03 | 1995-09-19 | Advanced Micro Devices | Clock control technique and system for a microprocessor including a thermal sensor |
US5490059A (en) | 1994-09-02 | 1996-02-06 | Advanced Micro Devices, Inc. | Heuristic clock speed optimizing mechanism and computer system employing the same |
US5502838A (en) * | 1994-04-28 | 1996-03-26 | Consilium Overseas Limited | Temperature management for integrated circuits |
US5793882A (en) * | 1995-03-23 | 1998-08-11 | Portable Data Technologies, Inc. | System and method for accounting for personnel at a site and system and method for providing personnel with information about an emergency site |
US5848373A (en) * | 1994-06-24 | 1998-12-08 | Delorme Publishing Company | Computer aided map location system |
US5914675A (en) | 1996-05-23 | 1999-06-22 | Sun Microsystems, Inc. | Emergency locator device transmitting location data by wireless telephone communications |
US6049272A (en) * | 1997-01-22 | 2000-04-11 | Boyd B. Moore et al. | Automated data transmission link to law enforcement and security personnel |
US6106459A (en) * | 1996-03-29 | 2000-08-22 | Clawson; Jeffrey J. | Method and system for the entry protocol of an emergency medical dispatch system |
US6188939B1 (en) | 1997-08-18 | 2001-02-13 | The Texas A&M University System | Advanced law enforcement and response technology |
US6188329B1 (en) * | 1998-11-23 | 2001-02-13 | Nestor, Inc. | Integrated traffic light violation citation generation and court date scheduling system |
US6233313B1 (en) * | 1998-03-26 | 2001-05-15 | Bell Atlantic Network Services | Call detail reporting for lawful surveillance |
US6335688B1 (en) * | 1999-09-28 | 2002-01-01 | Clifford Sweatte | Method and system for airport security |
US6563910B2 (en) * | 2001-02-26 | 2003-05-13 | Royal Thoughts, Llc | Emergency response information distribution |
US6571174B2 (en) * | 2001-08-14 | 2003-05-27 | Matsushita Electric Industrial Co., Ltd. | Apparatus for efficient dispatch and selection of information in law enforcement applications |
US20030158683A1 (en) * | 2002-02-19 | 2003-08-21 | Claude Gauthier | Temperature calibration using on-chip electrical fuses |
US6621422B2 (en) * | 2001-10-01 | 2003-09-16 | Advanced Public Safety, Inc. | Apparatus for communicating with law enforcement during vehicle travel and associated methods |
US6952164B2 (en) * | 2002-11-05 | 2005-10-04 | Matsushita Electric Industrial Co., Ltd. | Distributed apparatus to improve safety and communication for law enforcement applications |
US6960990B2 (en) * | 2002-10-31 | 2005-11-01 | General Motors Corporation | Telematics vehicle security system and method |
US7036030B1 (en) | 2002-02-07 | 2006-04-25 | Advanced Micro Devices, Inc. | Computer system and method of using temperature measurement readings to detect user activity and to adjust processor performance |
US7133661B2 (en) * | 2001-02-19 | 2006-11-07 | Hitachi Kokusai Electric Inc. | Emergency information notifying system, and apparatus, method and moving object utilizing the emergency information notifying system |
US7148763B2 (en) * | 2002-10-15 | 2006-12-12 | Marvell World Trade Ltd. | Integrated circuit including processor and crystal oscillator emulator |
US7197419B2 (en) * | 2005-02-03 | 2007-03-27 | International Business Machines Corporation | System and method for thermal monitoring of IC using sampling periods of invariant duration |
-
2002
- 2002-09-19 US US10/246,855 patent/US7356474B2/en active Active
-
2007
- 2007-11-14 US US11/939,912 patent/US7406423B2/en not_active Expired - Lifetime
Patent Citations (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3678391A (en) | 1970-04-06 | 1972-07-18 | Sylvania Electric Prod | Digital communication system |
US5027383A (en) | 1987-06-12 | 1991-06-25 | Versus Technology, Inc. | Supervised, interactive alarm reporting system |
US5502838A (en) * | 1994-04-28 | 1996-03-26 | Consilium Overseas Limited | Temperature management for integrated circuits |
US5848373A (en) * | 1994-06-24 | 1998-12-08 | Delorme Publishing Company | Computer aided map location system |
US5490059A (en) | 1994-09-02 | 1996-02-06 | Advanced Micro Devices, Inc. | Heuristic clock speed optimizing mechanism and computer system employing the same |
US5451892A (en) | 1994-10-03 | 1995-09-19 | Advanced Micro Devices | Clock control technique and system for a microprocessor including a thermal sensor |
US5793882A (en) * | 1995-03-23 | 1998-08-11 | Portable Data Technologies, Inc. | System and method for accounting for personnel at a site and system and method for providing personnel with information about an emergency site |
US6106459A (en) * | 1996-03-29 | 2000-08-22 | Clawson; Jeffrey J. | Method and system for the entry protocol of an emergency medical dispatch system |
US5914675A (en) | 1996-05-23 | 1999-06-22 | Sun Microsystems, Inc. | Emergency locator device transmitting location data by wireless telephone communications |
US6049272A (en) * | 1997-01-22 | 2000-04-11 | Boyd B. Moore et al. | Automated data transmission link to law enforcement and security personnel |
US6188939B1 (en) | 1997-08-18 | 2001-02-13 | The Texas A&M University System | Advanced law enforcement and response technology |
US6411874B2 (en) * | 1997-08-18 | 2002-06-25 | Texas A&M University Systems | Advanced law enforcement and response technology |
US6233313B1 (en) * | 1998-03-26 | 2001-05-15 | Bell Atlantic Network Services | Call detail reporting for lawful surveillance |
US6188329B1 (en) * | 1998-11-23 | 2001-02-13 | Nestor, Inc. | Integrated traffic light violation citation generation and court date scheduling system |
US6335688B1 (en) * | 1999-09-28 | 2002-01-01 | Clifford Sweatte | Method and system for airport security |
US7133661B2 (en) * | 2001-02-19 | 2006-11-07 | Hitachi Kokusai Electric Inc. | Emergency information notifying system, and apparatus, method and moving object utilizing the emergency information notifying system |
US6563910B2 (en) * | 2001-02-26 | 2003-05-13 | Royal Thoughts, Llc | Emergency response information distribution |
US6571174B2 (en) * | 2001-08-14 | 2003-05-27 | Matsushita Electric Industrial Co., Ltd. | Apparatus for efficient dispatch and selection of information in law enforcement applications |
US6621422B2 (en) * | 2001-10-01 | 2003-09-16 | Advanced Public Safety, Inc. | Apparatus for communicating with law enforcement during vehicle travel and associated methods |
US7036030B1 (en) | 2002-02-07 | 2006-04-25 | Advanced Micro Devices, Inc. | Computer system and method of using temperature measurement readings to detect user activity and to adjust processor performance |
US20030158683A1 (en) * | 2002-02-19 | 2003-08-21 | Claude Gauthier | Temperature calibration using on-chip electrical fuses |
US7148763B2 (en) * | 2002-10-15 | 2006-12-12 | Marvell World Trade Ltd. | Integrated circuit including processor and crystal oscillator emulator |
US6960990B2 (en) * | 2002-10-31 | 2005-11-01 | General Motors Corporation | Telematics vehicle security system and method |
US6952164B2 (en) * | 2002-11-05 | 2005-10-04 | Matsushita Electric Industrial Co., Ltd. | Distributed apparatus to improve safety and communication for law enforcement applications |
US7197419B2 (en) * | 2005-02-03 | 2007-03-27 | International Business Machines Corporation | System and method for thermal monitoring of IC using sampling periods of invariant duration |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8209185B2 (en) * | 2003-09-05 | 2012-06-26 | Emc Corporation | Interface for management of auditory communications |
US8103873B2 (en) | 2003-09-05 | 2012-01-24 | Emc Corporation | Method and system for processing auditory communications |
US20050055213A1 (en) * | 2003-09-05 | 2005-03-10 | Claudatos Christopher Hercules | Interface for management of auditory communications |
US8229904B2 (en) | 2004-07-01 | 2012-07-24 | Emc Corporation | Storage pools for information management |
US20060004819A1 (en) * | 2004-07-01 | 2006-01-05 | Claudatos Christopher H | Information management |
US8180742B2 (en) | 2004-07-01 | 2012-05-15 | Emc Corporation | Policy-based information management |
US8180743B2 (en) | 2004-07-01 | 2012-05-15 | Emc Corporation | Information management |
US8244542B2 (en) | 2004-07-01 | 2012-08-14 | Emc Corporation | Video surveillance |
US9268780B2 (en) | 2004-07-01 | 2016-02-23 | Emc Corporation | Content-driven information lifecycle management |
US20060004818A1 (en) * | 2004-07-01 | 2006-01-05 | Claudatos Christopher H | Efficient information management |
US20060047518A1 (en) * | 2004-08-31 | 2006-03-02 | Claudatos Christopher H | Interface for management of multiple auditory communications |
US8626514B2 (en) * | 2004-08-31 | 2014-01-07 | Emc Corporation | Interface for management of multiple auditory communications |
US9930158B2 (en) | 2005-06-13 | 2018-03-27 | Ridetones, Inc. | Vehicle immersive communication system |
US9976865B2 (en) | 2006-07-28 | 2018-05-22 | Ridetones, Inc. | Vehicle communication system with navigation |
US8856009B2 (en) | 2008-03-25 | 2014-10-07 | Intelligent Mechatronic Systems Inc. | Multi-participant, mixed-initiative voice interaction system |
US8838075B2 (en) | 2008-06-19 | 2014-09-16 | Intelligent Mechatronic Systems Inc. | Communication system with voice mail access and call by spelling functionality |
US9652023B2 (en) | 2008-07-24 | 2017-05-16 | Intelligent Mechatronic Systems Inc. | Power management system |
US20100305807A1 (en) * | 2009-05-28 | 2010-12-02 | Basir Otman A | Communication system with personal information management and remote vehicle monitoring and control features |
US8577543B2 (en) | 2009-05-28 | 2013-11-05 | Intelligent Mechatronic Systems Inc. | Communication system with personal information management and remote vehicle monitoring and control features |
US9667726B2 (en) | 2009-06-27 | 2017-05-30 | Ridetones, Inc. | Vehicle internet radio interface |
US20110121991A1 (en) * | 2009-11-25 | 2011-05-26 | Basir Otman A | Vehicle to vehicle chatting and communication system |
US9978272B2 (en) * | 2009-11-25 | 2018-05-22 | Ridetones, Inc | Vehicle to vehicle chatting and communication system |
US9042873B2 (en) | 2010-06-07 | 2015-05-26 | Intelligent Mechatronic Systems Inc. | On the road groups |
US9795521B2 (en) * | 2013-09-23 | 2017-10-24 | Halcore Group, Inc. | Emergency vehicle control application |
US20150088339A1 (en) * | 2013-09-23 | 2015-03-26 | Horton Emergency Vehicles | Emergency vehicle control application |
US11208125B2 (en) * | 2016-08-08 | 2021-12-28 | Transportation Ip Holdings, Llc | Vehicle control system |
WO2018075443A1 (en) * | 2016-10-17 | 2018-04-26 | Muppirala Ravikumar | Remote identification of person using combined voice print and facial image recognition |
US10679490B2 (en) | 2016-10-17 | 2020-06-09 | Md Enterprises Global Llc | Remote identification of person using combined voice print and facial image recognition |
US12112613B2 (en) | 2016-10-17 | 2024-10-08 | Md Enterprises Global Llc | Systems and methods for identification of a person using live audio and/or video interactions including local identification and remote identification of the person |
Also Published As
Publication number | Publication date |
---|---|
US7406423B2 (en) | 2008-07-29 |
US20080065392A1 (en) | 2008-03-13 |
US20040059582A1 (en) | 2004-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7406423B2 (en) | Remotely enforcing operational protocols | |
US9111453B1 (en) | Traffic management server and a traffic recording apparatus | |
RU2714805C2 (en) | Method and system of vehicle for performing secret call of an operator of rescue services (embodiments) | |
US8823502B2 (en) | Method and system for implementing a geofence boundary for a tracked asset | |
CA2566900C (en) | Remote access system and method and intelligent agent therefor | |
US6445300B1 (en) | Personal emergency information transmitter | |
US20180350354A1 (en) | Methods and system for analyzing conversational statements and providing feedback in real-time | |
CN106385554B (en) | Firearm law enforcement recorder | |
AU2021246640B2 (en) | Voice interface alert management | |
WO2015070654A1 (en) | Android-based mobile equipment security protection method, and device | |
CN101409867B (en) | Target locating method based on global navigation locating function and SMS | |
WO2015038312A1 (en) | Method of and system for controlling communications over a public safety network | |
CN101450652A (en) | Theft-protection safety monitor system for automobile | |
US20190244491A1 (en) | Streetlight control for emergency response | |
WO2023236436A1 (en) | Designated driver management system based on biometric identification technology | |
CN110312043A (en) | A kind of notification method based on audio, device, terminal device and medium | |
CN116343447A (en) | Dynamic alarm receiving and quick alarm outputting method, device, equipment and storage medium | |
AU2016205895B2 (en) | Determining entry into or exit from a place while a tracking device is in the place | |
JP3864267B1 (en) | Authentication mobile terminal device and authentication mobile terminal program | |
CN110059619B (en) | Automatic alarm method and device based on image recognition | |
CN111179969A (en) | Alarm method, device and system based on audio information and storage medium | |
AU2015213351A1 (en) | A Method and System for Generating a Report | |
CN106850391A (en) | Alarm treatment method and system based on internet | |
JP2006252194A (en) | Local security support system | |
CN111382595A (en) | Student park leaving management method and device, computer device and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:KUMHYR, DAVID B.;REEL/FRAME:013314/0190 Effective date: 20020918 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: NUANCE COMMUNICATIONS, INC., MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:022354/0566 Effective date: 20081231 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NUANCE COMMUNICATIONS, INC.;REEL/FRAME:065533/0389 Effective date: 20230920 |